Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

DeVry University, New York COMP 129 1)Why is having the correct device driver so important? What is the primary purpose of the power supply?     Under what Android Settings option Bluetooth would be enabled?     Which of the following is most likely used to troubleshoot an IEEE 1394 device?     What is the maximum transfer rate for a USB 2

Computer Science Jun 07, 2021

DeVry University, New York

COMP 129

1)Why is having the correct device driver so important?

  1. What is the primary purpose of the power supply?

 

 

  1. Under what Android Settings option Bluetooth would be enabled?

 

 

  1. Which of the following is most likely used to troubleshoot an IEEE 1394 device?

 

 

  1. What is the maximum transfer rate for a USB 2.0 port?

 

 

  1. What atmospheric condition can increase the potential for static electricity?

 

 

  1. One practical method to lower frustration that arises when reassembling the computer is

 

 

  1. Which unit would you recommend for the help desk people who sit at a computer for a 24/7 operation where help must be provided at all times?

 

 

 

  1. A _________is required before software from the BIOS is executed.

 

  1. Which of the following would help with computer heat?

 

 

  1. Which laptop accessory would be used to connect multiple displays to the laptop?

 

 

  1. While working with a ribbon cable and connector, you discover that the connector is keyed. This means that the connector _____________
  2. What is the best method to use when cleaning the optical sensors on a wireless mouse?

 

 

  1. Refer to the provided figure. What type of cable would have this symbol?

 

 
 
 

 

 

 

  1. Microsoft Server, Windows 7, Acrobat Reader, Flash Player, Microsoft Word, WordPerfect, and Lotus 1-2-3 are all examples of
  2. Three common tasks performed during preventive maintenance include
  3. PC technicians, as well as many other types of technicians, are often thought of as individuals with
  4. Consider the following e-mail to a fellow technician: ?Hey Joe! I really need some help here. I have a hard drive that will not keep a second partition. I KNOW THAT YOU SON OF A GUN REALLY KNOW THIS STUFF and i want your xpert mind. :-) Would you help me out? a3, awhfy?

: -)?

 

 

 

 

 

 

  1. From the following choices, select the one arranged in the order from lowest to highest.

 

 

  1. What does quad core mean in relation of processors?

 

 

  1. Which component is located outside the CPU?

 

  1. An engineering professor teaches CAS at the university. Which expansion slot would be best for the graphics card in the professor's computer?

 

  1. The speed of a computer

 

  1. Which of the following is most susceptible to ESD?

 

  1. The motherboard form factor must match

 

  1. Double-sided memory

 

  1. Which type of RAM would most likely be used in a dual channel configuration?

 

  1. Dual channeling

 

  1. What Windows utility is used to determine the amount of available RAM?

 

  1. Where are mini PCIe cards normally installed?

 

  1. After you power up a computer, it performs a basic test of the individual hardware components. The test is called a

 

  1. When do you need to upgrade the system BIOS?

 

 

  1. How does POST work with CMOS?

 

 

  1. What should a technician avoid doing when speaking with a customer about his computer problem?

 

 

 

  1. What is a benefit of active listening?

 

 

  1. What Windows option(s) would be used to move a file from one folder to another one?

 

  1. What is a home screen on a mobile device?

 

  1. Which option would allow a smartphone to be backed up to a remote server?

 

  1. The operating system does which one of the following?

 

 

  1. Describe an easy way to tell if an icon is a shortcut.

 

  1. A user is working in Microsoft Word. He saves the document called LTR1.DOCX to a folder called WORDDOCS. The WORDDOCS folder is a subfolder of the DOCUMENTS folder located on the D: hard drive volume. Write the complete path for the LTR1.DOC file.

 

 

  1. Linux has a variety of _________that provide the basic functionality that you are used to when working with an operating system, such as the cp command for copying files, the mv command for moving files, the vi editor for editing a text file, and so on.

 

  1. What is journaling?
  2. A newly installed Windows 7 application causes the computer to freeze. What is the best course of action to take?

 

 

  1. Who is given credit for the GNU initiative?

 

  1. What does the Microsoft term %systemroot% mean?

 

  1. Which installation would support full use of 6 GB of RAM?

 

  1. What Windows MSCONFIG tab allows a technician to disable half of the programs that launch as part of the boot process?

 

  1. What Windows tool enables you to control another PC without prompting for permission?

 

  1. As a professional, you will be expected to perform your best at all times. All of the ideas below can help to prevent burnout except

 

 

 

 

 

  1. You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?

 

  1. A laptop normally has an ________type of hard drive installed.

 

  1. Which backup type would back up all the user's data and set the archive bit for each file?

 

 

  1. What is the primary cause of hard drive failures?

 

  1. Why is backing up data to a different partition on the same hard drive not a good idea?
  2. You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk

2. R RAID 1 volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true?

 

  1. Which Windows tool would be used to verify that an optical drive is recognized by the system?

 

  1. USB speakers have the advantage of reducing the opportunity for interference. What is the potential drawback?

 

  1. What term is used to describe the number of samples a sound card takes to create the reproduction of the original sound?

 

  1. Which optical medium has the greatest storage capacity?

 

  1. A CD does not work in a computer. What is the first thing you should try in this situation?

 

  1. What iOS app could be used to see saved photos?

 

  1. The most common type of DVI connector used with flat panel monitors is the

 

  1. A monitor is advertised as 1,920x1,680. To what do these numbers refer?

 

  1. How many colors can a 24-bit video adapter display?

 

  1. A user wants to expand his normal Windows 7 desktop work area across two monitors. What would be the best solution for this user?

 

  1. One of the technicians in your shop frequently swaps parts that do not fix the problem. The parts taken out of customer machines are taken to build private customer computers. This is an example of poor

 

  1. Which scenario shows a positive attitude?
  2. Diligent Dan needs to configure a VPN on his laptop so that he can work 20 more hours a Week from home. Which IE tab should Dan use to configure the VPN connection?

 

  1. Patsy is a DeVry University professor. Patsy has some online testing software that uses the Java plug-in. Which Internet Explorer tab can Patsy use to ensure that the plug-in is installed?

 

  1. A traditional phone call would be made using the

 

  1. Which type of address uses 128 bits?

 

  1. What layer of the OSI model encapsulates data into frames?

 

  1. How many wires are contained in an RJ-45 jack?

 

  1. The mapping of how the physical or logical paths of network devices connect is called

 

  1. Which statement best describes an SSID?

 

  1. Which command verifies that TCP/IP is working correctly on the local computer?

 

  1. The length of a MAC address is 48 bits, an IPv4 address is 32 bits and an IPv6 address is

 

  1. Which is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

 

  1. Which application is more likely to justify the investment in Category 6 cable?

 

 

  1. What is a rating for the amount of data that can be sent over a network in a period of time?

 

  1. Which tool would you use in Windows Vista or Windows 7 to manage network connections?

 

  1. For what would a technician use Mozilla Firefox?

 

 

 

 

  1. The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is

 

  1. What authentication protocol does Windows use when sending an account name and password to a domain controller for validation?

 

  1. Just as with desktop computers, you might be able to solve a problem with a notebook that has an unstable system or a motherboard component by

 

  1. A(n) ________is about the size of a credit card, but thicker.

 

  1. Which Windows tool do you use to view a recorded log of network activity?

 

  1. A Trojan horse

 

  1. A _________does not need a host program to work; rather, it substitutes itself for a legitimate program.

 

  1. A strong password should

 

  1. The largest security risk for stealing confidential data comes from

 

  1. ________prove(s) that individuals are who they say they are.

 

  1. No one can ping a specific Windows 7 computer. What administrative tool can be used to change this default behavior?

 

  1. What security term describes a program written to collect information and store it on the hard drive?

 

  1. Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
  2. Which of the following Linux commands will change the /home/henry/smile file’s modification and last accessed times to the current time

 

  1. Which option is the standard shell for most Linux computers?

 

  1. A folder has both NTFS and shared folder permissions applied. What is the result of this action?
  2. Which technique provides the most security for the clients on a wireless network?

 

  1. For wireless communications of your portable devices, TKIP and ______improve WEP encryption.

 

  1. Trust between you and your customer begins with

 

  1. All below involve trust between you and your customers, except do not overcharge the customer for work performed.

if you are to work at the customer’s desk, you clear all things and papers away, do your work and put it all back without informing the customer.

 

if you happen to see confidential material, let the customer know you have seen it.

 

if you are going to be late, let the customer know as soon as possible.

 

 

  1. What materials are required for this course? Select all that apply.

 

 

  1. You will need your Lab Simulation Software for your lab assignment in what week of the course?

 

 

  1. This term, the quizzes are worth _______ of your final grade and the Final Exam is worth _____

of your final grade.

 

  1. Which weeks of the course have weekly quizzes, and how many points is each quiz?

 

  1. Each week contains two graded discussion topics. To get full credit for each week's discussions, you must contribute at least __ quality posts to _____topic.

 

  1. A high score for quality in the discussions is dependent upon behaviors such as

 

  1. Plagiarism is a violation of the Academic Integrity code of this institution. It is important that students fully cite any outside ideas, text, and visual aids they reference. The plagiarism policy applies to which of the following course activities?

 

 

 

 

 

  1. What component is most likely to be included in a home server PC design?

 

  1. At the shell prompt, you need to create a new text file with the name network.txt in the current directory. Which command starts vi and creates the file?

 

  1. A technician receives a call from a distraught user that claims to have a bad hard disk drive in the computer. The first step the technician should take is to
  2. What step should be done after a hardware component has been replaced?

 

  1. Hardware is checked out sequentially by the

 

  1. What is the best source for looking up a particular POST error code?

 

  1. Which statement is true when comparing a laptop component with a desktop component?

 

  1. After pushing the power switch of the PC to the ?on? position, Bob, the PC repair person, realizes that the power-on lights found on the monitor and computer case do not light up and nothing displays on the screen. What is the first thing that Bob should do to fix the problem?

 

  1. When replacing a laptop hard drive, you should purchase a

 

  1. An internal keyboard is generally connected to the laptop’s system board using a
Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment